Ziften Endpoint Security Solution
Photo Gallery
![]() |
Ziften Endpoint Security Solution

Additional Info
Company | Ziften |
Company size (number of employees) | 64 employees |
Website | http://www.ziften.com |
NOMINATION HIGHLIGHTS
Ziften’s continuous endpoint visibility solution reduces attack detection and mitigation time by 70 percent – on average from 14 hours to four hours – with the ability to stop the attack from spreading, potentially eliminating millions in costs, and saving a company’s reputation with customers, employees, partners, and investors. Several integrations with threat intelligence and visualization solutions help organizations amplify their existing deployed products in both security and network operations, as well as automated integration with the security team’s daily workflow.
Ziften Differentiators:
Painless & Fast: Easy and rapid deployment and day-to-day use
• Deploy in hours, not days, with our lightweight and efficient collector.
• Dynamically capture pertinent endpoint analytics displayed intuitively for rapid decision-making.
• Real-time analysis provides continuous intelligence and prioritized alerts for targeted response.
Accessible & Interoperable: Integrate with your security solutions and workflow
• Extend and enhance your current security investment with integration and sharing with leading security, network, and management tools.
• Get more out of your existing security stack with Ziften Open Visibility™, providing direct integration with leading products including Splunk, Lancope, AlienVault, Palo Alto Networks, ServiceNow, HP ArcSight and more.
• Operationalize current threat feed intelligence with actionable real-time alerts.
Optimized & Flexible: Target the intelligence you need now and tomorrow
• Capture context-rich data from all relevant endpoint activity to immediately pinpoint exposures, direct actions, and streamline forensics.
• Dynamically adapts to ever-changing environments and architecture shifts.
• Scale with existing environment and ensure flexibility by implementing as SaaS or on-premise.
Smart & Responsive: Respond, remediate, and recover faster
• Accelerate remediation and response in order to contain threats before they propagate further.
• Illuminate and analyze endpoint activity associated with observed network traffic using Ziften’s IETF standard-based Ziften ZFlow™.
• Fingertip access to years of meaningful endpoint data for historical look back and behavioral analysis.
How we are different
• Threats are faster, smarter, and more targeted than ever before, working their way around traditional prevention solutions and often getting straight to the point; the endpoints. Once breached, the endpoints—laptops, desktops, servers, and more—spread their malicious load to additional victims within 60 minutes, and it continues to permeate throughout the organization. According to recent reports: 71% of breaches and attacks involved compromised end-user devices. (2013 Verizon Data Breach Investigation Report). Speed kills in cyber security, and for many security teams it’s their inability to monitor and act fast enough to detect and respond to these attacks. At Ziften we understood this challenge and purpose-built our continuous endpoint visibility solution to be deployed quickly and to immediately amplify the skillset of any security team and the tools they already have in place.
• Ziften architected its endpoint innovation with a solution that provides continuous visibility and high performance; with ultra-low resource consumption Ziften leaves only a negligible footprint in resource usage, maximizes data storage, and scales seamlessly. That allows our customers to focus on the end result: the immediate discovery, analysis, and response to security exposures on their endpoints.
• The existing market is traditional endpoint anti-virus (sometimes referred to as Endpoint Protection Platforms). EPP only knows how to eradicated known malware, and the problem with this approach is that malware exists in organizations’ networks for over 200 days before it is discovered. Ziften is disrupting this model by looking at all processes, good, bad, and the unknown, and analyzing them to determine if they are Indicators of Compromise, vulnerable software that can easily be breached, or if the systems running the processes are compliant with security policies.
Vote by Sharing
- Like
- Digg
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Each completed social share counts as a vote for this award nomination.